For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical
applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges.

This book provides:

Use cases and solution reference architectures to
enable infrastructure integrity and the creation of trusted pools leveraging
Intel Trusted Execution Technology (TXT). 
Trusted geo-location management in the cloud,
enabling workload and data location compliance and boundary control usages in
the cloud. 
OpenStack-based reference architecture 
of  tenant-controlled virtual machine and workload protection in the
A reference design to enable secure hybrid clouds
for a cloud bursting use case, providing infrastructure visibility and control
to organizations.

Add Comment
Thanks! I added it to my library.

Disclaimer: By providing links to other sites, does not guarantee, approve or endorse the information or products available at these sites, nor does a link indicate any association with or endorsement by the linked site to

Thanks for visiting Join for free to remove this ad.

While FatWallet makes every effort to post correct information, offers are subject to change without notice.
Some exclusions may apply based upon merchant policies.
© 1999-2017